Skip to content

Wezery/CVE-2019-14529

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 

CVE-2019-14529

Multiple SQL Injection vulnerability in OpenEMR project

Vulnerable function in file: /openemr/interface/forms/eye_mag/save.php

Conditions : any authorized user

Vulnerable versions: <5.0.2, Fixed in 5.0.2 version.

Description

There are two functions:

  1. "store_PDF", with non filtered variable "encounter",
  2. "canvas", with non two filtered variable "encounter" and "zone".

Both functions use this variables in DELETE sql query without any filtration. Both variables controlled by attacker.

Error messages contains code of SQL queries and SQL error message. It can be used for exploit error-based type of SQL Injection.

Impact

Disclosure of VERY sensitive information, since this software used in medical sphere.

Other

OpenEMR official site

OpenEMR git repo

Patch for this issue

P.S. Special thanks to Brady G. Miller from OpenEMR team for fast response and patches

About

OpenEMR Security issue

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published